From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Semantic Mapping of Energy Simulation Data Using Bag of Words and Graph Matching., , , и . Geoinformatics, стр. 1-5. IEEE, (2018)Abnormal User Behavior Generation based on DCGAN in Zero Trust Network., , , , , , и . ITQM, том 214 из Procedia Computer Science, стр. 1500-1505. Elsevier, (2022)User and Service Classification in Power Grid Management System based on Random Forest., , , , , , , и . WI/IAT (Workshop/Special Session), стр. 1-4. ACM, (2021)Control information description model and processing mechanism in the trustworthy and controllable network., , , и . Integrated Network Management, стр. 398-405. IEEE, (2009)NCPP: A Network Control Programmale Platform of Trustworthy Controllable Network., , , и . ICDCS Workshops, стр. 221-226. IEEE Computer Society, (2009)SQUARE: A New TCP Variant for Future High Speed and Long Delay Environments., , , , и . AINA, стр. 636-643. IEEE Computer Society, (2008)Malicious Code Family Classification Method Based on Spatial Pyramid Pooling and Deep Residual Network., , , , , и . CCIS, стр. 260-264. IEEE, (2021)Riemannian Space-based Mutual Learning for Cyber Attack Detection., , , , , и . MLMI, стр. 136-142. ACM, (2023)A Malicious Program Attack Identification Model Based on Risk Dependency Analysis., , , , , и . MLMI, стр. 175-182. ACM, (2022)Semantic Integration based User Behavior Monitoring Framework in Zero Trust Network., , , , , , и . CBD, стр. 224-227. IEEE, (2022)